×

System, method, and computer program product for comparing an object with object enumeration results to identify an anomaly that at least potentially indicates unwanted activity

  • US 8,613,093 B2
  • Filed: 08/15/2007
  • Issued: 12/17/2013
  • Est. Priority Date: 08/15/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for avoiding a false positive identification of an anomaly that potentially indicates unwanted activity based on an object that has been unlinked or deleted prior to identifying object enumeration results, comprising:

  • identifying a change in a state of the object via a filter driver of a security system, wherein the object is included in a predetermined list of objects of an operating system being monitored for object manipulation events;

    determining whether the object has been unlinked or deleted;

    if it is determined that the object has not been unlinked, determining whether results of an object enumeration have been identified by a kernel enumeration interface that utilizes a directory in which the object is expected to be included;

    if it is determined that the results of the object enumeration have not been identified, determining repeatedly whether the object has been unlinked or deleted until the results of the object enumeration have been identified or in response to a determination that the object has been unlinked;

    if the object has not been unlinked nor deleted and if the results of the object enumeration have been identified, comparing the object with results of the object enumeration;

    if the object has been unlinked or deleted, preventing the comparing step;

    identifying at least potentially unwanted activity based on the comparison, wherein the identifying includes identifying an anomaly associated with the object being removed from a particular list a kernel of the operating system is to utilize for the object enumeration; and

    initiating an analysis of a process that requested the change in the state of the object, wherein the analysis is configured to identify a rootkit associated with the unwanted activity.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×